front pagenewsNorth Korean hackers Lazarus Group targets crypto wallets with fake NFTs

North Korean hackers Lazarus Group targets crypto wallets with fake NFTs

Published on

spot_img

Key Summary:
Lazarus Group hackers used fake NFT games to steal crypto wallet credentials.
The malware in DeTankZone exploits a Chrome vulnerability for remote access.
Social engineering helps the Lazarus Group target large audiences.


Yerevan (CoinChapter.com) – North Korean hackers known as Lazarus Group used fake NFT games to exploit Chrome vulnerabilities to steal crypto wallet credentials. Security analysts at Kaspersky Lab reported that the cyberattack exploited a zero-day vulnerability in Google Chrome to gain unauthorized access to user devices. The attackers targeted the blockchain game clone DeTankZone and advertised it as a play-to-earn (P2E) multiplayer online battle arena (MOBA) game to lure unsuspecting players.


Lazarus Group’s malware was embedded in the source code of the DeTankZone NFT game.
securelist.com
Lazarus Group embedded malware directly into gaming websites
detankzone.com
This allowed them to infect any device that interacted with the site. According to Kaspersky, the malicious script bypassed Chrome's security protections. It exploited a vulnerability in Chrome's V8 JavaScript engine, enabling remote code execution. In this way, the hackers deployed the Manuscrypt malware and took control of user devices. This access allowed them to obtain sensitive crypto wallet credentials without downloading or other typical interactions.
Kaspersky discovers Chrome vulnerability, Google releases patch
After discovering the vulnerability, Kaspersky Lab immediately notified Google. Soon after, Google released a security update to address the vulnerability, even though the attackers had already accessed several devices. The incident raised concerns about the wider impact of such attacks on cryptocurrency users and businesses around the world.
Boris Larin and Vasily Berdnikov, security analysts at Kaspersky, noted that the Lazarus Group used advanced social engineering techniques to create an illusion of authenticity for the game. They set up a professional website and high-level LinkedIn account to establish credibility. In addition, the attackers used social platforms such as X and LinkedIn to use AI-generated marketing materials and invited well-known cryptocurrency influencers to promote the fake NFT game. This comprehensive approach attracted a wide audience and increased the effectiveness of the attack.
Lazarus Group has a long history of cryptocurrency theft
The fake NFT game was not just a cover, it was a fully operational game. It included detailed game elements such as logos, 3D graphics, and user interfaces. However, anyone who visited the site was at serious risk. The Lazarus Group embedded the Manuscrypt malware in the game website. This malware harvested sensitive crypto wallet credentials, allowing them to conduct large-scale cryptocurrency theft.
The Lazarus Group has long been targeting the cryptocurrency industry. Notably, between 2020 and 2023, investigator ZachXBT linked them to more than 25 hacks with a total loss of more than $200 million. Therefore, this history highlights the group's continued focus on cryptocurrency theft. In addition, they often rely on vulnerabilities and social engineering to succeed.


Lazarus Group’s $200 million cryptocurrency laundering operation. Source:
ZachXBT
Major Cryptocurrency Theft Linked to Lazarus Group
Over the years, the Lazarus Group has conducted many major cryptocurrency theft operations. For example, in 2022, they reportedly stole more than $600 million in Ether (ETH) and USD Coin (USDC) through the Ronin Bridge hack. In addition, the U.S. Treasury Department has linked them to multiple cyberattacks against financial institutions and global cryptocurrency platforms.
In September 2023, data from 21.co (the parent company of 21Shares) showed that the organization still held more than $47 million in various cryptocurrencies. These included assets such as Bitcoin (BTC), Binance Coin (BNB), Avalanche (AVAX), and Polygon (MATIC).
Furthermore, the report estimates that the Lazarus Group has amassed more than $3 billion in digital assets between 2017 and 2023. Their influence on the cryptocurrency industry is enormous, highlighting their continued focus on the cryptocurrency market.
Social engineering is key to Lazarus Group’s cyber strategy
It is worth noting that the success of this attack relied heavily on social engineering. Through carefully crafted promotional materials, AI-generated graphics, and credible-looking LinkedIn profiles, the Lazarus Group successfully disguised their fake NFT games as legitimate games, attracting cryptocurrency enthusiasts. This sophisticated approach circumvents common cybersecurity defenses and expands the range of potential victims.

Latest Articles

XRP大户抛售4.7亿枚代币,但图表显示未来有77%的反弹空间

XRP价格走势显示潜在反弹信号XRP价格走势显示出潜在的反弹信号,因为TD顺序指标在9小时图上打印了“9”买入信号。市场分析师Ali(@ali_charts)追踪的这一工具之前准确标记了局部顶部,在8...

SEI价格即将突破?图表显示170%反弹并发出新的买入信号

SEI价格走势与TD序列指标紧密相关根据市场分析师Ali(@ali_charts)的说法,SEI的价格走势在过去三周中与TD序列指标密切相关。每一次主要的价格波动都准确地跟随了该工具的信号,从局部高点...

Sei Network 新闻:Coinbase 将 SEI 集成至即时稳定币协议中

Coinbase将Sei添加至其x402协议,实现HTTP下即时稳定币支付该协议基于HTTP 402“需要支付”状态码,允许API、应用程序和AI代理在无需钱包或中介的情况下进行交易结算。通过Sei的...

莱特币(LTC)交易者关注买入区间,ETF决策面临新一轮SEC延迟

尽管最近回调,交易者对莱特币(LTC)价格走势仍持乐观态度,认为下行是新的买入机会。交易者在社交媒体上分享了指向支撑区的帖子,这些支撑区可能会触发反弹,从而使市场情绪保持在积累而非清算的状态。自8月1...

More Articles

XRP大户抛售4.7亿枚代币,但图表显示未来有77%的反弹空间

XRP价格走势显示潜在反弹信号XRP价格走势显示出潜在的反弹信号,因为TD顺序指标在9小时图上打印了“9”买入信号。市场分析师Ali(@ali_charts)追踪的这一工具之前准确标记了局部顶部,在8...

SEI价格即将突破?图表显示170%反弹并发出新的买入信号

SEI价格走势与TD序列指标紧密相关根据市场分析师Ali(@ali_charts)的说法,SEI的价格走势在过去三周中与TD序列指标密切相关。每一次主要的价格波动都准确地跟随了该工具的信号,从局部高点...

Sei Network 新闻:Coinbase 将 SEI 集成至即时稳定币协议中

Coinbase将Sei添加至其x402协议,实现HTTP下即时稳定币支付该协议基于HTTP 402“需要支付”状态码,允许API、应用程序和AI代理在无需钱包或中介的情况下进行交易结算。通过Sei的...
en_GBEnglish